Unable to handle kernel paging request at virtual address dfff800000000000 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 [dfff800000000000] address between user and kernel address ranges Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4282 Comm: syz.0.16 Not tainted 5.15.186-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : btrfs_root_node+0xdc/0x3d4 fs/btrfs/ctree.c:132 lr : rcu_read_lock include/linux/rcupdate.h:740 [inline] lr : btrfs_root_node+0x84/0x3d4 fs/btrfs/ctree.c:131 sp : ffff80001fe87250 x29: ffff80001fe87250 x28: dfff800000000000 x27: ffff8000116f2000 x26: 0000000000000001 x25: ffff8000116f2780 x24: ffff8000165c2000 x23: ffff8000116f27c0 x22: ffff8000165c2000 x21: 0000000000000001 x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000111cf35c x15: ffff800008976868 x14: ffff8000089732c4 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000000 x10: 0000000000000000 x9 : ffff800009e0a144 x8 : ffff0000d96f9b40 x7 : ffff800009e1d804 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000002 x2 : 0000000000000008 x1 : ffff8000117d99e0 x0 : 0000000000000001 Call trace: rcu_read_lock include/linux/rcupdate.h:740 [inline] btrfs_root_node+0xdc/0x3d4 fs/btrfs/ctree.c:131 btrfs_read_lock_root_node+0x68/0x35c fs/btrfs/locking.c:276 btrfs_build_ref_tree+0xec/0xf90 fs/btrfs/ref-verify.c:993 open_ctree+0x1dc0/0x27b8 fs/btrfs/disk-io.c:3609 btrfs_fill_super+0x1b4/0x2d4 fs/btrfs/super.c:1387 btrfs_mount_root+0x730/0x780 fs/btrfs/super.c:1751 legacy_get_tree+0xd4/0x16c fs/fs_context.c:611 vfs_get_tree+0x90/0x274 fs/super.c:1530 fc_mount fs/namespace.c:996 [inline] vfs_kern_mount+0xdc/0x178 fs/namespace.c:1026 btrfs_mount+0x2a0/0x8d4 fs/btrfs/super.c:1811 legacy_get_tree+0xd4/0x16c fs/fs_context.c:611 vfs_get_tree+0x90/0x274 fs/super.c:1530 do_new_mount+0x228/0x810 fs/namespace.c:3014 path_mount+0x5b4/0x1000 fs/namespace.c:3344 do_mount fs/namespace.c:3357 [inline] __do_sys_mount fs/namespace.c:3565 [inline] __se_sys_mount fs/namespace.c:3542 [inline] __arm64_sys_mount+0x514/0x5e4 fs/namespace.c:3542 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 Code: 52805ca1 aa1703e2 390fc2da 95cbe406 (387c6a88) ---[ end trace 26b531736a66fed9 ]--- ---------------- Code disassembly (best guess): 0: 52805ca1 mov w1, #0x2e5 // #741 4: aa1703e2 mov x2, x23 8: 390fc2da strb w26, [x22, #1008] c: 95cbe406 bl 0x72f9024 * 10: 387c6a88 ldrb w8, [x20, x28] <-- trapping instruction